Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/05/2024, 02:29
Behavioral task
behavioral1
Sample
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
-
Size
161KB
-
MD5
1a578c9055a1451622017cd253d238f2
-
SHA1
a1b72de550c0012a1c556697ce1d371440fcbc2b
-
SHA256
337fe8b50b6db4e741246ca76f27a8dd4e505cceebf9a9577be2d03dd5c5810a
-
SHA512
f095c5d8e2ec70ce38de23be00c9dc364b24d85506d205832d225c33fb1cae2b8555cc1b52f055d7b69df7ee42c96d9d80699033cecbc06e4fe65334af720d29
-
SSDEEP
1536:7mseS0rh3UharM4WHMnEA0tepkq8e7Pbi4eTMluxtXDCntTnICS4ADEq5tsMzYqV:tsM4oA0tCHLbi4eTMlwDCnuSq7OR
Malware Config
Extracted
C:\Users\2zs2s5r-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4968BBA9040DFE66
http://decryptor.top/4968BBA9040DFE66
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2940 rundll32.exe 5 2940 rundll32.exe 7 2940 rundll32.exe 8 2940 rundll32.exe 10 2940 rundll32.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\m82ye2qu43do.bmp" rundll32.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification \??\c:\program files\ProtectRedo.temp rundll32.exe File opened for modification \??\c:\program files\ProtectRevoke.html rundll32.exe File opened for modification \??\c:\program files\ShowReset.m4v rundll32.exe File opened for modification \??\c:\program files\UndoBackup.3gp rundll32.exe File opened for modification \??\c:\program files\ConvertFromSearch.7z rundll32.exe File opened for modification \??\c:\program files\ExpandRestart.bmp rundll32.exe File created \??\c:\program files\dcecd7ac.lock rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\2zs2s5r-readme.txt rundll32.exe File opened for modification \??\c:\program files\UseCheckpoint.html rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\2zs2s5r-readme.txt rundll32.exe File opened for modification \??\c:\program files\ClearDisable.pps rundll32.exe File opened for modification \??\c:\program files\UnlockGroup.docx rundll32.exe File opened for modification \??\c:\program files\OpenMerge.MTS rundll32.exe File opened for modification \??\c:\program files\PublishProtect.dot rundll32.exe File opened for modification \??\c:\program files\ReadAdd.odp rundll32.exe File opened for modification \??\c:\program files\RegisterPop.png rundll32.exe File opened for modification \??\c:\program files\SubmitOpen.avi rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\2zs2s5r-readme.txt rundll32.exe File opened for modification \??\c:\program files\ExitSend.rar rundll32.exe File opened for modification \??\c:\program files\HideAssert.mpeg3 rundll32.exe File opened for modification \??\c:\program files\OutProtect.csv rundll32.exe File opened for modification \??\c:\program files\ProtectTrace.DVR-MS rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\dcecd7ac.lock rundll32.exe File opened for modification \??\c:\program files\ConfirmEnter.png rundll32.exe File opened for modification \??\c:\program files\HideImport.dwfx rundll32.exe File created \??\c:\program files\2zs2s5r-readme.txt rundll32.exe File opened for modification \??\c:\program files\RemoveRegister.rtf rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\dcecd7ac.lock rundll32.exe File created \??\c:\program files (x86)\2zs2s5r-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertFromUnlock.mp3 rundll32.exe File opened for modification \??\c:\program files\ResumeWatch.dxf rundll32.exe File opened for modification \??\c:\program files\UpdateRestart.xhtml rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\dcecd7ac.lock rundll32.exe File created \??\c:\program files (x86)\dcecd7ac.lock rundll32.exe File opened for modification \??\c:\program files\FindPush.easmx rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 752 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2940 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2412 vssvc.exe Token: SeRestorePrivilege 2412 vssvc.exe Token: SeAuditPrivilege 2412 vssvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2880 wrote to memory of 2940 2880 rundll32.exe 28 PID 2940 wrote to memory of 2804 2940 rundll32.exe 29 PID 2940 wrote to memory of 2804 2940 rundll32.exe 29 PID 2940 wrote to memory of 2804 2940 rundll32.exe 29 PID 2940 wrote to memory of 2804 2940 rundll32.exe 29 PID 2804 wrote to memory of 752 2804 cmd.exe 31 PID 2804 wrote to memory of 752 2804 cmd.exe 31 PID 2804 wrote to memory of 752 2804 cmd.exe 31 PID 2804 wrote to memory of 752 2804 cmd.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:752
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a2676a76e19bd7db3c00f7a7184b713d
SHA1f2a12b903492c8c4b1153286af5a21c794bec65e
SHA256d5e4a1c5cde99e48f58494daf04b0a2558a57b72e27cd76f75be7ee3496496e4
SHA512894bd00c1106f38fa1e35c0d85e7a8ed8551b7f3e3ffc43c58d0cc5fb1c5476e076ae88661ca2d5c906904cf6453e7e593e48ce4e023728b93b22dc2e05dd90e